<div dir="auto"><div dir="auto"><br></div><div dir="auto">Hey all, </div><div dir="auto"><br></div><div dir="auto">New 4G security vulnerability is out that they claim also impacts 5G. </div><div dir="auto"><br></div><a href="https://www.bleepingcomputer.com/news/security/security-flaws-disclosed-in-lte-4g-mobile-telephony-standard/">https://www.bleepingcomputer.com/news/security/security-flaws-disclosed-in-lte-4g-mobile-telephony-standard/</a><div dir="auto"><br></div><div dir="auto">"<span style="background-color:rgb(255,255,255);color:rgb(38,48,52);font-family:georgia,"times new roman",times,serif;font-size:18px">Two of the three attacks are passive, meaning an attacker can watch LTE traffic and determine various details about the target, while the third is an active attack that lets the attacker manipulate data sent to the user's LTE device.</span></div><p style="margin:15px 0px;font-size:18px;color:rgb(38,48,52);font-family:georgia,"times new roman",times,serif;line-height:1.4em;word-wrap:break-word;background-color:rgb(255,255,255)">According to researchers, the passive attacks allow an attacker to collect meta-information about the user's traffic (an identity mapping attack), while the second allows the attacker to determine what websites a user might be visiting through his LTE device (a website fingerprinting attack)."</p><p style="margin:15px 0px;font-size:18px;color:rgb(38,48,52);font-family:georgia,"times new roman",times,serif;line-height:1.4em;word-wrap:break-word;background-color:rgb(255,255,255)"><br></p><p style="margin:15px 0px;font-size:18px;color:rgb(38,48,52);font-family:georgia,"times new roman",times,serif;line-height:1.4em;word-wrap:break-word;background-color:rgb(255,255,255)">Best,</p><p style="margin:15px 0px;font-size:18px;color:rgb(38,48,52);font-family:georgia,"times new roman",times,serif;line-height:1.4em;word-wrap:break-word;background-color:rgb(255,255,255)">s2e</p><div dir="auto"><br></div></div>